A systematic literature review on phishing email detection using natural language processing techniques

S Salloum, T Gaber, S Vadera, K Shaalan - IEEE Access, 2022‏ - ieeexplore.ieee.org
Every year, phishing results in losses of billions of dollars and is a major threat to the Internet
economy. Phishing attacks are now most often carried out by email. To better comprehend …

[HTML][HTML] A study on the psychology of social engineering-based cyberattacks and existing countermeasures

MA Siddiqi, W Pak, MA Siddiqi - Applied Sciences, 2022‏ - mdpi.com
As cybersecurity strategies become more robust and challenging, cybercriminals are
mutating cyberattacks to be more evasive. Recent studies have highlighted the use of social …

[HTML][HTML] Enhancing software code vulnerability detection using gpt-4o and claude-3.5 sonnet: A study on prompt engineering techniques

J Bae, S Kwon, S Myeong - Electronics, 2024‏ - mdpi.com
This study investigates the efficacy of advanced large language models, specifically GPT-4o,
Claude-3.5 Sonnet, and GPT-3.5 Turbo, in detecting software vulnerabilities. Our experiment …

Avoiding the hook: influential factors of phishing awareness training on click-rates and a data-driven approach to predict email difficulty perception

T Sutter, AS Bozkir, B Gehring, P Berlich - Ieee Access, 2022‏ - ieeexplore.ieee.org
Phishing attacks are still seen as a significant threat to cyber security, and large parts of the
industry rely on anti-phishing simulations to minimize the risk imposed by such attacks. This …

Optimized and efficient image-based IoT malware detection method

A El-Ghamry, T Gaber, KK Mohammed, AE Hassanien - Electronics, 2023‏ - mdpi.com
With the widespread use of IoT applications, malware has become a difficult and
sophisticated threat. Without robust security measures, a massive volume of confidential and …

[HTML][HTML] Phish responder: A hybrid machine learning approach to detect phishing and spam emails

M Dewis, T Viana - Applied System Innovation, 2022‏ - mdpi.com
Using technology to prevent cyber-attacks has allowed organisations to somewhat automate
cyber security. Despite solutions to aid organisations, many are susceptible to phishing and …